Privileged analytics system
A Shmueli, A Dulkin, S Yair, A Weiss - US Patent 9,712,548, 2017 - Google Patents
A computer-implemented method for determining whether a computer network is
compromised by unauthorized activity on the computer network. The computer-implemented …
compromised by unauthorized activity on the computer network. The computer-implemented …
Systems and methods for detection of anomalous network behavior
R Bernstein, A Dulkin - US Patent 9,565,203, 2017 - Google Patents
There is provided a computer implemented method for detecting anomalous behavior in a
network, comprising: receiving data representing at least one network activity, each network …
network, comprising: receiving data representing at least one network activity, each network …
Anomaly detection in groups of network addresses
R Bernstein, A Dulkin, A Weiss, A Shmueli - US Patent 9,497,206, 2016 - Google Patents
--------Learn model: represented by the node. Nodes having respective ripeness scores
within a specified range are classified as ripe nodes, and may be indicative of normal …
within a specified range are classified as ripe nodes, and may be indicative of normal …
Method and computer device to control software file downloads
MJ Austin - US Patent 9,589,131, 2017 - Google Patents
A computer device includes a download unit which downloads one or more files into a
storage device. A file logging unit records a resource locator identifying a source network …
storage device. A file logging unit records a resource locator identifying a source network …
Systems and methods for true privilege application elevation
B Hibbert, G Iverson, J Lustig-Rusch… - US Patent App. 15 …, 2017 - Google Patents
A method comprising storing a privilege rule, detecting an instruction to execute an
application, and determining whether execution of the application requires an elevated …
application, and determining whether execution of the application requires an elevated …
Temporarily providing higher privileges for computing system to user identifier
JJ Auvenshine, BJ Klingenberg, N Garimella… - US Patent …, 2015 - Google Patents
A root user identifier of a computing system is disabled. Thereafter, and in response to
determining that a problem with the computing system requires root privileges to the …
determining that a problem with the computing system requires root privileges to the …
Method and system for detecting unauthorized access to and use of network resources
A Dulkin, S Yair, R Adar - US Patent 9,876,804, 2018 - Google Patents
Methods and systems are disclosed for detecting unauthorized actions associated with
network resources, the actions including access to the resource and activity associated with …
network resources, the actions including access to the resource and activity associated with …
Systems and methods for process self-elevation
K Meyer, G Chirhart, A Marks - US Patent 8,442,960, 2013 - Google Patents
A computer-implemented method for elevating privileges for a process may comprise: 1)
determining that the process requires elevated privileges for proper execution, 2) attempting …
determining that the process requires elevated privileges for proper execution, 2) attempting …
Modernization of legacy applications using dynamic icons
CF Lategan - US Patent 9,304,754, 2016 - Google Patents
Methods, systems, and techniques for automatically allocating and dynamically determining
icons for placement on legacy task output as part of modernizing such tasks are provided …
icons for placement on legacy task output as part of modernizing such tasks are provided …
Systems and methods for controlling privileged operations
A Kolishchak - US Patent 10,977,361, 2021 - Google Patents
Systems and methods for controlling privileged operations. The system and method may
comprise the steps of: provid ing a kernel module having a kernel authorization subsys tem …
comprise the steps of: provid ing a kernel module having a kernel authorization subsys tem …